Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.429 -- Foundstone Advisory FS-101501-20-GWSE Novell Groupwise arbitrary file retrieval vulnerability 17 October 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Novell GroupWise 5.5 Novell GroupWise 6 Vendor: Novell Operating System: Windows 2000 Impact: Access Privileged Data Access Required: Remote - --------------------------BEGIN INCLUDED TEXT-------------------- FS Advisory ID: FS-101501-20-GWSE Release Date: October 15, 2001 Product: Novell GroupWise Vendor: Novell (http://www.novell.com) Vendor Advisory: See vendor website. Type: Arbitrary file retrieval vulnerability Severity: High Author: Mike Shema (mike.shema@foundstone.com) Foundstone, Inc. (http://www.foundstone.com) Operating Systems: Windows 2000 Vulnerable versions: GroupWise 5.5, 6 Foundstone Advisory: http://www.foundstone.com/cgi-bin/display.cgi?Content_ID=327 - --------------------------------------------------------------------- Description A vulnerability exists with Novell's GroupWise server which allows for the arbitrary viewing of files anywhere on the system. This includes files outside of the web root, but on the same volume as the web server. Details The Novell GroupWise server has a web-based front-end for users to access e-mail and other functions of the server. The default login page is accessed by the URL: /servlet/webacc The webacc usually accesses templates from the "/" directory; however, the servlet will follow directory path traversal. It is possible to view the full path of the server install by passing an invalid argument to the User.html variable: /servlet/webacc?User.html=noexist which will display the full path of the GroupWise install. Arbitrary files can be read by the webacc servlet by passing the appropriate file name and appending a null character to the string: /servlet/webacc?User.html=../../../../../../../../boot.ini%00 Administrators should note that the Groupwise configuration files can be viewed with this exploit. Care should be taken to limit the amount of sensitive data within these files. Proof of concept From a browser, make the following URL request: http://server:port/servlet/webacc?User.html=../../../../../../ ../../boot.ini%00 Solution Please contact the vendor for a solution. Customers should obtain upgraded software by contacting their customer support representative to obtain patches. The severity of this vulnerability and vulnerabilities of a similar nature can be significantly reduced by installing the GroupWise server (or other application) files on a disk volume separate from the windows system root. Credits We would also like to thank Novell for their reaction to this problem and their co-operation in heightening security awareness in the security community. Disclaimer The information contained in this advisory is the copyright (C) 2001 of Foundstone, Inc. and believed to be accurate at the time of printing, but no representation or warranty is given, express or implied, as to its accuracy or completeness. Neither the author nor the publisher accepts any liability whatsoever for any direct, indirect or conquential loss or damage arising in any way from any use of, or reliance placed on, this information for any purpose. This advisory may be redistributed provided that no fee is assigned and that the advisory is not modified in any way. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBO82lIyh9+71yA2DNAQEo3AP/S5u2m/0nmhWqTjJJAg/RqF6bdD5Z4PVG RqiwNenc76AaVFhryuZPgH7ic2cfa+GS8PHko2f0cr1TtPz8tGR4LSZR9sgUNWC+ tsMoBzsSQLUvBwQPI4xWcte79gsu17MZUC3/04cnm3koBP9eXNcPgzGuxcl/BiX9 qRXWpm2yD30= =LI8D -----END PGP SIGNATURE-----